article thumbnail

SHARED INTEL: What can be done — today — to keep quantum computing from killing encryption

The Last Watchdog

In fact, there’s widespread recognition in corporate circles that the planning to address fresh cyber risks associated with quantum computing should have commenced long ago. Their trepidation is focused on the potential undermining of a core security component of classical computing systems: encryption. Germany and Japan.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? Cryptographic inventories need finalizing and quantum safe encryption needs to be adopted for sensitive communications and data. Their guidance: Snehal Antani , CEO, Horizon3.ai

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Guide to Key Management as a Service

Thales Cloud Protection & Licensing

The most effective way to ensure data security is through encryption and proper key management. Key Management as a Service (KMaaS) allows companies to manage encryption keys more effectively through a cloud-based solution instead of running the service on physical, on-premises hardware.

article thumbnail

Cohesity Launches Security Advisor – Making It as Easy as Scan, Score, Remediate to Improve Security Posture and Reduce Cyber Risks in an Era of Sophisticated Ransomware Attacks

CyberSecurity Insiders

–( BUSINESS WIRE )– Cohesity today introduced Security Advisor, an addition to the company’s Threat Defense architecture that gives customers an easy way to improve their security posture in an era of rapidly sophisticated and damaging cyberattacks. SAN JOSE, Calif.–(

article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

Today, criminal hackers rather routinely leverage loosely-configured and lightly-monitored APIs in two ways: to gain a foothold in the early stages of multi-stage network attacks, and later to encrypt crucial systems and/or exfiltrate sensitive data. API complexity. API security is more complex than traditional web security.

article thumbnail

The Nature of Cybersecurity Defense: Pentagon To Reveal Updated Zero-Trust Cybersecurity Strategy & Guidelines

CyberSecurity Insiders

That’s why authorization is a critical aspect of zero-trust architecture. As a result, organizations rely on Zero Trust architectures to construct how users and entities are connected to organizational and agency resources. The Proper Authentication of Digital Assets.

article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022. Legacy security architectures just don’t fit this massively complex, highly dynamic environment. Related: ‘SASE’ framework extends security to the network edge.